Position: Home page » Blockchain » BFT algorithm of blockchain
BFT algorithm of blockchain
Publish: 2021-04-27 18:25:45
1. blockchain encrypts the transaction information in a transaction block by hash algorithm, and compresses the information into a hash string composed of a string of numbers and letters
jinwowo group analyzes the functions of its hash algorithm as follows:
the hash value of the blockchain can uniquely and accurately identify a block. Any node in the blockchain obtains the hash value of the block through simple hash calculation, and the calculated hash value does not change, which means that the information in the blockchain has not been tampered with.
jinwowo group analyzes the functions of its hash algorithm as follows:
the hash value of the blockchain can uniquely and accurately identify a block. Any node in the blockchain obtains the hash value of the block through simple hash calculation, and the calculated hash value does not change, which means that the information in the blockchain has not been tampered with.
2. 1. Pow (proof of work) workload proof
one sentence introction: the more you do, the more you get
2. POS proof of stake
in a word: the more you hold, the more you get< Pbft: practical Byzantine fault tolerance
3. Pbft: practical Byzantine fault tolerance
Introction: it provides (n-1) / 3 fault tolerance on the premise of ensuring the activity and safety< Dbft: Byzantine fault tolerant algorithm authorized by delegated BFT
Introction: dbft mechanism adopted by ant is that bookkeepers are selected by rights and interests, and then bookkeepers reach a consensus through Byzantine fault tolerant algorithm
5. Pool verification pool
is based on traditional distributed consistency technology and data verification mechanism
chainnova is a blockchain company. I feel it's very good. Although I don't know any hash algorithm, I still know a little bit.
one sentence introction: the more you do, the more you get
2. POS proof of stake
in a word: the more you hold, the more you get< Pbft: practical Byzantine fault tolerance
3. Pbft: practical Byzantine fault tolerance
Introction: it provides (n-1) / 3 fault tolerance on the premise of ensuring the activity and safety< Dbft: Byzantine fault tolerant algorithm authorized by delegated BFT
Introction: dbft mechanism adopted by ant is that bookkeepers are selected by rights and interests, and then bookkeepers reach a consensus through Byzantine fault tolerant algorithm
5. Pool verification pool
is based on traditional distributed consistency technology and data verification mechanism
chainnova is a blockchain company. I feel it's very good. Although I don't know any hash algorithm, I still know a little bit.
3. Chongqing jinwowo analysis distributed consensus algorithm:
the blockchain system uses the distributed consensus algorithm to generate and update data, which eliminates the possibility of illegal tampering with data from the technical level, thus replacing the third-party intermediary institutions in traditional applications to ensure trust and transaction security, and recing the time cost, human cost and resource consumption caused by maintaining credit.
the blockchain system uses the distributed consensus algorithm to generate and update data, which eliminates the possibility of illegal tampering with data from the technical level, thus replacing the third-party intermediary institutions in traditional applications to ensure trust and transaction security, and recing the time cost, human cost and resource consumption caused by maintaining credit.
4. Blockchain encryption algorithm
asymmetric encryption algorithm is a function that converts the original plaintext file or data into a series of unreadable ciphertext codes by using an encryption key. The encryption process is irreversible. Only holding the corresponding decryption key can the encrypted information be decrypted into readable plaintext. Encryption enables private data to be transmitted through the public network under the condition of low risk, and protects the data from being stolen and read by the third party
the core advantage of blockchain technology is decentralization, which can realize point-to-point transaction, coordination and cooperation based on decentralized credit in a distributed system without mutual trust by means of data encryption, time stamp, distributed consensus and economic incentive, so as to solve the high cost and low cost of centralized institutions Low efficiency and data storage insecurity provide solutions
the application fields of blockchain include digital currency, token, finance, anti-counterfeiting traceability, privacy protection, supply chain, entertainment, etc. with the popularity of blockchain and bitcoin, many related top domain names have been registered, which has a great impact on the domain name instry.
asymmetric encryption algorithm is a function that converts the original plaintext file or data into a series of unreadable ciphertext codes by using an encryption key. The encryption process is irreversible. Only holding the corresponding decryption key can the encrypted information be decrypted into readable plaintext. Encryption enables private data to be transmitted through the public network under the condition of low risk, and protects the data from being stolen and read by the third party
the core advantage of blockchain technology is decentralization, which can realize point-to-point transaction, coordination and cooperation based on decentralized credit in a distributed system without mutual trust by means of data encryption, time stamp, distributed consensus and economic incentive, so as to solve the high cost and low cost of centralized institutions Low efficiency and data storage insecurity provide solutions
the application fields of blockchain include digital currency, token, finance, anti-counterfeiting traceability, privacy protection, supply chain, entertainment, etc. with the popularity of blockchain and bitcoin, many related top domain names have been registered, which has a great impact on the domain name instry.
5. Now it's just testing, there's no official release, there's no use for it?
6. I just came into contact with this project recently. I hope it can help you
FST network is a blockchain application technology service platform, which is committed to further application of blockchain. Its pillar proct FST network engine mole is an infrastructure built for enterprises to save development time. The FST network engine mole, through comprehensive molar logic construction, allows anyone to manage the certificate business without coding environment, reces the threshold of the blockchain development community, and saves the development cycle.
FST network is a blockchain application technology service platform, which is committed to further application of blockchain. Its pillar proct FST network engine mole is an infrastructure built for enterprises to save development time. The FST network engine mole, through comprehensive molar logic construction, allows anyone to manage the certificate business without coding environment, reces the threshold of the blockchain development community, and saves the development cycle.
7. Before this, the network knows that this thing often appears, and I have repeatedly reminded netizens that this is a pyramid scheme. Of course, I have been attacked by those people many times, but as a bitcoin person, I don't want bitcoin to be discredited by these MLM coins. This thing has nothing to do with bitcoin. It's just cheating under the guise of bitcoin
it is suggested that netizens should stay away from bitcoin and its related things if they don't understand bitcoin. This netizen can send me a private letter and tell me what you know. I will sort out and report on it.
it is suggested that netizens should stay away from bitcoin and its related things if they don't understand bitcoin. This netizen can send me a private letter and tell me what you know. I will sort out and report on it.
8. Zhongan chain uses Byzantine fault-tolerant algorithm with weight. Compared with the traditional workload proof algorithm, Zhongan chain's algorithm has a great improvement in block speed and consensus efficiency.
Hot content